<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="https://www.sitemaps.org/schemas/sitemap/0.9">
        <url>
        <loc>https://www.resecurity.com/</loc>
    </url>
            
    <url>
        <loc>https://www.resecurity.com/ar</loc>
    </url>
        
    <url>
        <loc>https://www.resecurity.com/pt</loc>
    </url>
        
    <url>
        <loc>https://www.resecurity.com/fr</loc>
    </url>
        
    <url>
        <loc>https://www.resecurity.com/jp</loc>
    </url>
        
    <url>
        <loc>https://www.resecurity.com/es</loc>
    </url>
    
    <url>
        <loc>https://www.resecurity.com/platform</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/context</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/cyber-fusion</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/risk</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/idp</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/epp</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/easm</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/threat-hunting</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/vapt</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/fraud-prevention</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/insider</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/deception</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/about-resecurity</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/partners</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/services/digital-forensics</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/services/ep</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/services/intelligence-services</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/services/managed-threat-detection</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/services/red-teaming</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/services/vciso</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/services/arbs</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/services/counterparty-assessment</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/services/asset-tracing</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/services/stress-testing</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/services/brand-protection</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/services/compromise-assessment</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/services/cyber-awareness-training</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/cookies-policy</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/compliance/cmmc</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/compliance/cmmi</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/compliance/dora</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/compliance/dpdpa-india</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/compliance/dpa-philippines</loc>
    </url>    <url>
        <loc>https://www.resecurity.com/compliance/nis2</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/compliance/pdpl-saudi-arabi</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/compliance/rbi-india</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/compliance/sama</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/compliance/hipaa</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/compliance/iso-27001</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/compliance/nca-ecc</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/compliance/pci-dss</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/compliance/dfars</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/compliance/gdpr</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/compliance/lgpd</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/compliance/irdai</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/compliance/sebi</loc>
    </url>

        <url>
        <loc>https://www.resecurity.com/news</loc>
    </url>
                <url>
            <loc>https://www.resecurity.com/press/article/resecurity-appoints-darrell-m-blocker-as-a-senior-advisor</loc>
            <lastmod>2024-09-25</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurity-recognized-as-a-leader-in-frost-sullivans-2024-global-cyber-threat-intelligence-market-radar</loc>
            <lastmod>2024-09-05</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurity-honored-with-presidents-e-award-recognized-leader-in-cybersecurity-exports</loc>
            <lastmod>2024-05-16</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurity-appoints-maj-gen-richard-lake-usmc-ret-as-a-senior-advisor</loc>
            <lastmod>2023-08-02</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/seed-group-onboards-los-angeles-based-resecurity-to-protect-the-digital-ecosystem-in-mena</loc>
            <lastmod>2023-07-18</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/rethinking-organizational-threat-intelligence</loc>
            <lastmod>2023-05-19</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurity-to-showcase-innovative-cybersecurity-solutions-at-rsa-conference-2023</loc>
            <lastmod>2023-05-19</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurity-exhibits-at-rsa-conference-2023-in-san-francisco</loc>
            <lastmod>2023-05-19</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurity-uncovers-styx-new-cybercriminal-platform-focused-on-financial-fraud</loc>
            <lastmod>2023-05-19</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurityr-exhibit-at-world-police-summit-2023-to-showcase-cyber-threat-intelligence-and-dark-web-monitoring-solutions</loc>
            <lastmod>2023-05-19</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurity-delivers-fraud-prevention-platform-to-protect-saudi-banks</loc>
            <lastmod>2023-05-19</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurity-appoints-akash-rosen-to-lead-digital-forensics-practice</loc>
            <lastmod>2023-05-19</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurity-identified-the-investment-scam-network-digital-smoke</loc>
            <lastmod>2023-05-19</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurity-warns-about-cyber-attacks-on-data-center-service-providers</loc>
            <lastmod>2023-05-19</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/darklight-partners-with-industry-leader-resecurity-to-integrate-next-generation-threat-intelligence</loc>
            <lastmod>2023-05-19</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurityr-announces-partnership-with-csg-centre-systems-group</loc>
            <lastmod>2023-05-19</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/fraud-prevention-technologies-are-in-the-spotlight-in-saudi-arabia</loc>
            <lastmod>2023-05-19</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurityr-announces-partnership-with-saudi-cybersecurity-company-cyber-ksa-at-blackhat-mea-2022</loc>
            <lastmod>2023-05-19</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/frost-sullivan-recognizes-resecurity-as-a-leader-in-the-cyber-threat-intelligence-market</loc>
            <lastmod>2023-05-19</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurity-brings-threat-intelligence-into-spotlight-at-black-hat-mea-2022</loc>
            <lastmod>2023-05-19</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/investment-scams-are-targeting-saudi-banking-customers</loc>
            <lastmod>2023-05-19</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/covid-19-data-put-for-sale-on-the-dark-web</loc>
            <lastmod>2023-05-19</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/escanor-malware-delivered-in-weaponized-microsoft-office-documents-2</loc>
            <lastmod>2023-05-19</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/logokit-update-the-phishing-kit-leveraging-open-redirect-vulnerabilities-2</loc>
            <lastmod>2023-05-19</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurity-expands-ai-driven-threat-intelligence-in-peru-with-cfbd-sac-partnership</loc>
            <lastmod>2023-05-19</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurityr-expands-vapt-capabilities-with-acquisition-of-cybit-sec-in-uae</loc>
            <lastmod>2023-05-19</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurity-digital-identity-protection-defends-individuals-and-businesses-from-identity-theft</loc>
            <lastmod>2023-05-19</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/blackcat-aka-alphv-ransomware-is-increasing-stakes-up-to-25-million-in-demands</loc>
            <lastmod>2023-05-19</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/cyberattacks-against-law-enforcement-are-on-the-rise</loc>
            <lastmod>2023-05-19</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurityr-debuts-cyber-threat-intelligence-solutions-at-milipol-qatar-2022-before-the-upcoming-fifa-world-cup</loc>
            <lastmod>2022-06-04</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurity-inc-nabs-a-spot-on-clutchs-top-100-list</loc>
            <lastmod>2022-05-17</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/brand-protection-cyber-security-in-the-spotlight-for-upcoming-fifa-world-cup-qatar-2022</loc>
            <lastmod>2022-05-10</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurity-showcases-cyber-threat-intelligence-solutions-at-fidae-aerospace-defense-2022</loc>
            <lastmod>2022-04-29</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecuritys-cyber-threat-intelligence-for-sama-compliance-protects-saudis-financial-services-sector</loc>
            <lastmod>2022-04-21</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/cyber-threat-intelligence-for-malaysias-digital-transformation</loc>
            <lastmod>2022-04-20</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurityr-makes-cyber-threat-intelligence-available-in-qatar-for-the-upcoming-fifa-world-cup-2022</loc>
            <lastmod>2022-04-05</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurityr-makes-cyber-threat-intelligence-available-in-qatar-for-the-upcoming-fifa-world-cup-2022-2</loc>
            <lastmod>2022-04-29</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurity-introduces-dark-web-intelligence-in-saudi-arabia</loc>
            <lastmod>2022-04-06</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurity-introduces-novel-cyber-intelligence-platform-at-african-land-forces-summit-alfs22</loc>
            <lastmod>2022-04-06</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurity-participated-at-the-world-defense-show-in-saudi-arabia</loc>
            <lastmod>2022-04-06</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/gene-yoo-ceo-of-resecurity-inc-helping-clients-protect-themselves-from-cyberthreat</loc>
            <lastmod>2022-04-06</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurity-wins-three-gold-cybersecurity-excellence-awards</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurity-introduced-cyber-threat-intelligence-solutions-for-law-enforcement-in-south-africa</loc>
            <lastmod>2022-04-06</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurity-introduced-innovative-cyber-threat-intelligence-solutions-at-west-2022</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurity-introduced-innovative-cyber-threat-intelligence-solutions-at-west-2022-2</loc>
            <lastmod>2022-04-06</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurity-partners-with-ml-consulting-to-advance-intelligent-cyber-security-solutions-in-mea</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurity-showcases-ai-powered-cybersecurity-solutions-at-intersec-2022-in-dubai</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurity-partners-with-secureit-to-accelerate-ai-powered-cybersecurity-in-the-nordic-countries</loc>
            <lastmod>2022-04-06</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/us-firm-resecurity-opens-new-ai-driven-rd-center-in-saudi-arabia</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurity-appoints-christian-lees-as-chief-technology-officer</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/securing-the-new-digital-ecosystem-resecurity-exhibits-at-dodiis-2021</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurity-brings-dark-web-intelligence-saas-to-aws-marketplace</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurity-partners-with-safety-and-intelligence-network-africa-sina-to-advance-cyber-threat-intelligence</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurity-brings-dark-web-and-threat-intelligence-to-aws-marketplace</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurity-brings-dark-web-threat-intelligence-aws-marketplace</loc>
            <lastmod>2022-06-16</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurity-named-as-a-top-10-fastest-growing-companies-in-los-angeles-by-inc</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurityr-appoints-selene-giupponi-managing-director-of-resecurity-europe</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/hyperx-is-official-gaming-peripheral-sponsor-of-the-us-cyber-games</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurity-introduces-innovative-cyber-risk-management-solutions-at-itu-digital-world-2021</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/stolen-private-data-on-ccsd-students-and-employees-released-online-by-hacker</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/united-nations-data-breach-hackers-obtained-employee-login-dark-web-executing-ongoing-attacks-un-agencies</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/meet-the-10-fastest-growing-private-companies-in-los-angeles</loc>
            <lastmod>2021-11-19</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/cybersecurity-pros-want-to-stop-talking-about-a-cyber-911</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/united-nations-says-attackers-breached-its-systems</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/un-keeps-getting-hit-by-cyber-attacks-how-should-they-respond</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/overnight-hillicon-valley-hacking-goes-global</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/united-nations-computers-breached-by-hackers-earlier-this-year</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurity-ranks-no-317-on-the-2021-inc-5000-with-three-year-revenue-growth-of-1446</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/getting-ahead-of-a-major-blind-spot-for-cisos-third-party-risk</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/best-threat-intelligence-platforms-tools-for-2021</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/t-mobile-probes-attack-confirms-systems-were-breached</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/microsoft-exchange-was-used-to-hack-diplomats-long-before-2021-cyber-attack</loc>
            <lastmod>2021-11-19</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/microsoft-exchange-used-to-hack-diplomats-before-2021-breach</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/us-cyber-games-coaching-team-and-top-athletes-to-be-announced-friday-july-9-2021-at-us-cyber-games-combine-kick-off-event</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/new-masq-tool-spoofs-device-fingerprints-allowing-attackers-to-bypass-security-checks</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurity-focusing-on-supply-chain-cybersecurity-to-protect-enterprises</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurity-named-winner-of-the-coveted-global-infosec-awards-during-rsa-conference-2021</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/sonicwall-was-hacked-was-it-also-extorted</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/citrix-employees-win-23m-settlement-over-2019-data-breach</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/parlers-new-partner-has-ties-to-the-russian-government</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/panasonic-indias-data-released-in-extortion-plot</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/hackers-were-inside-citrix-for-five-months</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/new-companies-commit-to-cybersecurity-tech-accord-principles-in-a-new-initiative-signatories-highlight-how-they-live-the-principles-day-in-and-day-out</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurity-appoints-selene-giupponi-managing-director-of-resecurity-europe-2</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurity-context-platform-as-a-service</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/two-windows-privilege-escalation-vulnerabilities-exploited-in-attacks</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/citrix-hack-exposed-employees-to-id-theft-and-fraud-lawsuit-says</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/resecurity-to-fully-index-the-dark-web-by-2020</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/weak-security-measures-jeopardized-one-companys-customer-data</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/how-sdp-would-have-prevented-the-citrix-hack</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/password-spraying-the-citrix-breach</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/who-is-resecurity-the-mysterious-firm-that-blamed-iran-for-the-citrix-hack</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/the-citrix-breach-what-is-password-spraying-anyway</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/citrix-systems-breached-for-10-years-by-iran-claims-unknown-infosec-firm</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/citrix-data-breach-were-iranians-or-international-cyber-criminals-to-blame</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/citrix-security-breach-sees-6tb-of-sensitive-data-stolen</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/citrix-data-breach-iranian-hackers-stole-6tb-of-sensitive-data</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/iranian-hackers-stole-terabytes-of-data-from-software-giant-citrix</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/iranian-backed-hackers-stole-data-from-major-us-government-contractor</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/press/article/citrix-discloses-security-breach-of-internal-network</loc>
            <lastmod>2022-03-08</lastmod>
        </url>
    
        <url>
        <loc>https://www.resecurity.com/events/upcoming</loc>
    </url>
    <url>
        <loc>https://www.resecurity.com/events/past</loc>
    </url>
                <url>
            <loc>https://www.resecurity.com/events/eurosatory</loc>
            <lastmod>2022-06-20</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/milipol-qatar-2022</loc>
            <lastmod>2022-06-20</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/milipol-asia-2022</loc>
            <lastmod>2022-06-09</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/techtalk-2022</loc>
            <lastmod>2022-04-18</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/dimdex-2022</loc>
            <lastmod>2022-04-18</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/hack-the-port</loc>
            <lastmod>2022-04-18</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/mena-e-crime-cyber-resilience-summit-2022</loc>
            <lastmod>2022-04-18</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/world-defense-show</loc>
            <lastmod>2022-04-18</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/laedc-annual-economic-forecast</loc>
            <lastmod>2022-04-18</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/west-2022</loc>
            <lastmod>2023-01-31</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/intersecexpo-2022</loc>
            <lastmod>2022-04-18</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/itu-telecom</loc>
            <lastmod>2022-04-19</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/dodiis-worldwide-defenseintel</loc>
            <lastmod>2022-04-19</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/avenger-con</loc>
            <lastmod>2022-04-19</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/community-college-cyber-summit</loc>
            <lastmod>2022-04-19</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/isc2-quantico</loc>
            <lastmod>2022-04-19</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/cyberx-africa</loc>
            <lastmod>2022-04-28</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/isaca-venice-chapter</loc>
            <lastmod>2022-04-19</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/community-college-cyber-summit-2</loc>
            <lastmod>2022-04-28</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/cyber-southwest-2021</loc>
            <lastmod>2022-04-28</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/disa-jsp-cybersecurity-forum</loc>
            <lastmod>2022-04-28</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/usda-cybersecurity-expo-2021</loc>
            <lastmod>2022-04-28</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/cyber-week-africa</loc>
            <lastmod>2022-04-28</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/the-cipher-brief</loc>
            <lastmod>2022-04-28</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/la-investment-summit</loc>
            <lastmod>2022-04-28</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/milipol-2021</loc>
            <lastmod>2022-04-28</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/gitex-technology-week</loc>
            <lastmod>2022-04-28</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/intel-summit-2021</loc>
            <lastmod>2022-04-28</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/2021-intelligence-national-security-summit</loc>
            <lastmod>2022-04-28</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/richmond-cyber-resilience-forum</loc>
            <lastmod>2022-04-28</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/navy-gold-coast-2021</loc>
            <lastmod>2022-04-28</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/ocwar-c</loc>
            <lastmod>2022-04-28</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/blackhat-2021</loc>
            <lastmod>2022-04-28</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/woman-4-cyber</loc>
            <lastmod>2022-04-28</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/borderless-cyber-2021</loc>
            <lastmod>2022-04-28</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/us-cyber-games</loc>
            <lastmod>2022-04-28</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/cyber-work-live</loc>
            <lastmod>2022-04-29</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/2021-air-force-intelligence-community-security-review-board</loc>
            <lastmod>2022-04-28</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/hack-2021</loc>
            <lastmod>2022-04-28</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/paris-call-working-group-3</loc>
            <lastmod>2022-04-28</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/technet-fort-bragg-symposium-expo</loc>
            <lastmod>2022-04-28</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/afcea-technet-cyber</loc>
            <lastmod>2022-04-28</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/8th-annual-cyber-focus-day</loc>
            <lastmod>2022-04-28</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/cyber-maryland-2021</loc>
            <lastmod>2022-04-29</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/protecting-your-small-business-from-cyber-attacks</loc>
            <lastmod>2022-04-29</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/virtual-it-vendor-day</loc>
            <lastmod>2022-04-29</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/issa-information-systems-security-association</loc>
            <lastmod>2022-04-29</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/hack-the-building</loc>
            <lastmod>2022-04-29</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/afcea-las-vegas-chapter-technology-cybersecurity-day</loc>
            <lastmod>2022-04-29</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/the-european-security-summit</loc>
            <lastmod>2022-04-29</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/events/wyoming-cybersecurity-conference-2020</loc>
            <lastmod>2022-04-29</lastmod>
        </url>
    
        <url>
        <loc>https://www.resecurity.com/blog</loc>
    </url>
                <url>
            <loc>https://www.resecurity.com/blog/article/pro-iranian-nasir-security-is-targeting-the-energy-sector-in-the-middle-east</loc>
            <lastmod>2026-03-23</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/iran-war-kinetic-cyber-electronic-and-psychological-warfare-convergence</loc>
            <lastmod>2026-03-20</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/inside-tycoon-2fa-disrupting-a-global-phishing-operation</loc>
            <lastmod>2026-03-06</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/cyber-battlefield-ariomex-iran-based-crypto-exchange-suffers-data-leak</loc>
            <lastmod>2026-03-04</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/clawdbot-moltbot-the-autonomous-ai-butler-that-could-expose-your-entire-digital-life</loc>
            <lastmod>2026-02-06</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/breaking-trust-with-words-prompt-injection-leading-to-simulated-etcpasswd-disclosure</loc>
            <lastmod>2026-01-26</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/cve-2026-22794-changing-the-origin-header-to-take-over-appsmith-accounts</loc>
            <lastmod>2026-01-21</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/pdfsider-malware-exploitation-of-dll-side-loading-for-av-and-edr-evasion</loc>
            <lastmod>2026-02-25</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/doomsday-for-cybercriminals-data-breach-of-major-dark-web-foru</loc>
            <lastmod>2026-01-11</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/cyber-counterintelligence-cci-when-shiny-objects-trick-shiny-hunters</loc>
            <lastmod>2026-01-07</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/knownsec-data-breach-a-trove-of-espionage-tradecraft-with-an-insider-narrative</loc>
            <lastmod>2026-01-01</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/mongobleed-cve-2025-14847-mongodb-memory-leak-flaw</loc>
            <lastmod>2025-12-30</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/cve-2025-68613-remote-code-execution-via-expression-injection-in-n8n-2</loc>
            <lastmod>2025-12-26</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/react2shell-explained-cve-2025-55182-from-vulnerability-discovery-to-exploitation</loc>
            <lastmod>2025-12-24</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/synthetic-data-a-new-frontier-for-cyber-deception-and-honeypots</loc>
            <lastmod>2026-01-04</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/dig-ai-uncensored-darknet-ai-assistant-at-the-service-of-criminals-and-terrorists</loc>
            <lastmod>2025-12-27</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/f5-big-ip-source-code-leak-tied-to-state-linked-campaigns-using-brickstorm-backdoor</loc>
            <lastmod>2025-12-19</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/qilin-ransomware-and-the-ghost-bulletproof-hosting-conglomerate</loc>
            <lastmod>2025-10-15</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/from-broadcast-to-breach-llmnrnbt-ns-poisoning-in-action</loc>
            <lastmod>2025-10-14</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/cve-2025-61882-mass-exploitation-oracle-e-business-suite-ebs-under-attack-by-cl0p-ransomware</loc>
            <lastmod>2025-10-07</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/shinyhunters-launches-data-leak-site-trinity-of-chaos-announces-new-ransomware-victims</loc>
            <lastmod>2025-10-03</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/trinity-of-chaos-the-lapsus-shinyhunters-and-scattered-spider-alliance-embarks-on-global-cybercrime-spree</loc>
            <lastmod>2025-09-30</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/shinyhunters-attacked-vietnams-financial-system-cic-data-leak</loc>
            <lastmod>2025-09-14</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/killsec-ransomware-is-attacking-healthcare-institutions-in-brazil</loc>
            <lastmod>2025-09-10</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/azure-ad-client-secret-leak-the-keys-to-cloud</loc>
            <lastmod>2025-09-01</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/mitm6-ntlm-relay-how-ipv6-auto-configuration-leads-to-full-domain-compromise</loc>
            <lastmod>2025-08-21</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/blue-locker-analysis-ransomware-targeting-oil-gas-sector-in-pakistan</loc>
            <lastmod>2025-08-14</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/ssrf-to-aws-metadata-exposure-how-attackers-steal-cloud-credentials</loc>
            <lastmod>2025-08-07</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/sharepoint-zero-day-exploit-cve-2025-53770-network-infrastructure-mapping</loc>
            <lastmod>2025-08-01</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/cybercriminals-attack-seychelles-offshore-banking-as-a-target</loc>
            <lastmod>2025-07-29</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/methods-to-bypass-otp-in-mobile-apps-successful-vapt-scenarios</loc>
            <lastmod>2025-07-25</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/chinese-threat-nfc-enabled-fraud-in-the-philippines-financial-sector</loc>
            <lastmod>2025-07-08</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/cybercriminals-target-brazil-248725-exposed-in-ciee-one-data-breach</loc>
            <lastmod>2025-07-03</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/iran-linked-threat-actors-leak-visitors-and-athletes-data-from-saudi-games</loc>
            <lastmod>2025-06-23</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/paraguay-is-being-targeted-by-cybercriminals-74-million-citizen-records-for-sale</loc>
            <lastmod>2025-06-13</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/apt-41-threat-intelligence-report-and-malware-analysis</loc>
            <lastmod>2025-06-09</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/api-security-the-importance-of-vulnerability-assessment-and-penetration-testing-vapt</loc>
            <lastmod>2025-06-02</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/how-interlock-ransomware-affects-the-defense-industrial-base-supply-chain</loc>
            <lastmod>2025-05-14</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/smishing-massive-scale-panda-shop-chinese-carding-syndicate</loc>
            <lastmod>2025-05-05</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/resurging-terror-threats-banks-vasps-leverage-cyfi-fight-back</loc>
            <lastmod>2025-04-25</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/how-nfc-enabled-pos-terminals-facilitate-cybercriminal-money-laundering-chains</loc>
            <lastmod>2025-04-24</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/nfc-fraud-wave-evolution-of-ghost-tap-on-the-dark-web</loc>
            <lastmod>2025-04-25</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/cyber-threats-against-energy-sector-surge-global-tensions-mount</loc>
            <lastmod>2025-04-15</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/digital-threats-targeting-india-banking-financial-services-and-insurance-insurance-bfsi-sector</loc>
            <lastmod>2025-04-09</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/cybercriminals-attacked-national-social-security-fund-of-morocco-millions-of-digital-identities-at-risk-of-data-breach</loc>
            <lastmod>2025-04-09</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/smishing-triad-is-now-targeting-toll-payment-services-in-a-massive-fraud-campaign-expansion</loc>
            <lastmod>2025-04-10</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/ensuring-data-privacy-and-compliance-in-the-philippine-insurance-industry</loc>
            <lastmod>2025-04-04</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/blacklock-ransomware-a-late-holiday-gift-with-intrusion-into-the-threat-actors-infrastructure</loc>
            <lastmod>2025-03-25</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/dark-web-intelligence-uncovers-fentanyl-trafficking-networks-persisting-on-telegram-part-3</loc>
            <lastmod>2025-03-21</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/dark-web-intelligence-uncovers-fentanyl-trafficking-networks-persisting-on-telegram-part-2</loc>
            <lastmod>2025-03-21</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/dark-web-intelligence-uncovers-fentanyl-trafficking-networks-persisting-on-telegram-part-1</loc>
            <lastmod>2025-03-21</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/dragonforce-ransomware-reverse-engineering-report</loc>
            <lastmod>2025-08-23</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/dragonforce-ransomware-group-is-targeting-saudi-arabia</loc>
            <lastmod>2025-08-23</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/kuwait-under-attack-by-smishing-triad-law-enforcement-takes-action</loc>
            <lastmod>2025-02-26</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/the-rise-of-cyber-espionage-uav-and-c-uav-technologies-as-targets</loc>
            <lastmod>2025-02-18</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/icao-and-acao-breached-cyberespionage-groups-targeting-aviation-safety-specialists</loc>
            <lastmod>2025-02-04</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/navigating-the-cybersecurity-frontier-in-2025-adapting-to-evolving-threats</loc>
            <lastmod>2025-01-07</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/cybercriminals-impersonate-dubai-police-to-defraud-consumers-in-the-uae-smishing-triad-in-action</loc>
            <lastmod>2024-12-12</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/how-vr-may-transform-security-operations-centers-socs</loc>
            <lastmod>2024-12-09</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/digital-echo-chambers-and-erosion-of-trust-key-threats-to-the-us-elections</loc>
            <lastmod>2024-10-28</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/cybercriminals-are-targeting-ai-agents-and-conversational-platforms-emerging-risks-for-businesses-and-consumers</loc>
            <lastmod>2024-10-09</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/qatar-is-accelerating-oversight-on-data-breaches-and-cybersecurity-incidents</loc>
            <lastmod>2024-10-03</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/iranian-cyber-actors-irgc-targeting-the-2024-us-presidential-election</loc>
            <lastmod>2024-09-30</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/resecurity-introduced-context-ai-to-accelerate-threat-intelligence-and-incident-response-capabilities</loc>
            <lastmod>2024-08-05</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/c2-frameworks-threat-hunting-in-action-with-yara-rules</loc>
            <lastmod>2024-08-04</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/terrorist-activity-is-accelerating-in-cyberspace-risk-precursor-to-summer-olympics-and-elections</loc>
            <lastmod>2024-08-01</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/cve-2024-4879-and-cve-2024-5217-servicenow-rce-exploitation-in-a-global-reconnaissance-campaign</loc>
            <lastmod>2025-03-23</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/smishing-triad-is-targeting-india-to-steal-personal-and-payment-data-at-scale</loc>
            <lastmod>2024-07-10</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/cybercriminals-are-targeting-digital-identity-of-singapore-citizens</loc>
            <lastmod>2024-06-27</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/smishing-triad-is-targeting-pakistan-to-defraud-banking-customers-at-scale</loc>
            <lastmod>2024-06-11</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/organized-north-korean-remote-it-worker-fraud-compels-organizations-to-enhance-hiring-verification-controls-with-next-gen-cti-2</loc>
            <lastmod>2024-06-11</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/cybercriminals-attack-banking-customers-in-eu-with-v3b-phishing-kit</loc>
            <lastmod>2024-06-04</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/navigating-the-hajj-season-a-time-of-spiritual-unity-and-rising-cyber-threats-targeting-consumers</loc>
            <lastmod>2024-05-30</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/cybercriminals-are-targeting-elections-in-india-with-influence-campaigns</loc>
            <lastmod>2024-05-21</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/massive-dump-of-hacked-salvadorean-headshots-and-pii-highlights-growing-threat-actor-interest-in-biometric-data</loc>
            <lastmod>2024-05-06</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/misinformation-and-hacktivist-campaigns-target-the-philippines-amidst-rising-tensions-with-china</loc>
            <lastmod>2024-04-19</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/the-new-version-of-jsoutprox-is-attacking-financial-institutions-in-apac-and-mena-via-gitlab-abuse</loc>
            <lastmod>2024-04-04</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/cybercriminals-transform-raspberry-pi-into-a-tool-for-fraud-and-anonymization-geobox-discovery</loc>
            <lastmod>2024-03-25</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/cybercriminals-accelerate-online-scams-during-ramadan-and-eid-fitr</loc>
            <lastmod>2024-03-24</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/the-aviation-and-aerospace-sectors-face-skyrocketing-cyber-threats</loc>
            <lastmod>2024-03-18</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/cybercriminals-evolve-tooling-for-remote-access-compromise</loc>
            <lastmod>2024-03-16</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/Active-dark-web-Intelligence-aid-M-A</loc>
            <lastmod>2024-03-11</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/lockbit-30s-bungled-comeback-highlights-the-undying-risk-of-torrent-based-data-leakage</loc>
            <lastmod>2024-03-06</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/millions-of-undetectable-malicious-urls-generated-via-the-abuse-of-public-cloud-and-web-30-services</loc>
            <lastmod>2026-01-25</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/how-brics-got-rug-pulled-crypto-counterfeiting-is-on-the-rise</loc>
            <lastmod>2024-02-19</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/global-malicious-activity-targeting-elections-is-skyrocketing</loc>
            <lastmod>2024-02-16</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/following-the-anydesk-incident-customer-credentials-leaked-and-published-for-sale-on-the-dark-web</loc>
            <lastmod>2024-02-05</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/hundreds-of-network-operators-credentials-found-circulating-in-dark-web</loc>
            <lastmod>2024-01-30</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/cybercriminals-leaked-massive-volumes-of-stolen-pii-data-from-thailand-in-dark-web</loc>
            <lastmod>2024-06-06</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/vast-voter-data-leaks-cast-shadow-over-indonesias-2024-presidential-election</loc>
            <lastmod>2024-01-15</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/cybercriminals-implemented-artificial-intelligence-ai-for-invoice-fraud</loc>
            <lastmod>2024-01-04</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/new-version-of-medusa-stealer-released-in-dark-web</loc>
            <lastmod>2023-12-27</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/cybercriminals-launched-leaksmas-event-in-the-dark-web-exposing-massive-volumes-of-leaked-pii-and-compromised-data</loc>
            <lastmod>2023-12-27</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/2024-cyber-threat-landscape-forecast</loc>
            <lastmod>2023-12-21</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/cybercriminals-impersonate-uae-federal-authority-for-identity-and-citizenship-on-the-peak-of-holidays-season</loc>
            <lastmod>2023-12-19</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/Exposing-Cyber-Extortion-Trinity-BianLian-White-Rabbit-Mario-Ransomware-Gangs-Spotted-Joint-Campaign</loc>
            <lastmod>2023-12-15</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/hunting-genetics-data-cyberespionage-in-the-context-of-geopolitical-conflicts</loc>
            <lastmod>2023-12-20</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/icbc-ransomware-attack-strikes-at-the-heart-of-the-global-financial-order-lockbit-on-a-roll</loc>
            <lastmod>2023-12-03</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/ransomware-attacks-against-the-energy-sector-on-the-rise-nuclear-and-oil-gas-are-major-targets-2024</loc>
            <lastmod>2023-11-13</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/blog/article/pii-belonging-to-indian-citizens-including-their-aadhaar-ids-offered-for-sale-on-the-dark-web</loc>
            <lastmod>2023-11-01</lastmod>
        </url>
    
        <url>
        <loc>https://www.resecurity.com/advisories</loc>
    </url>
                <url>
            <loc>https://www.resecurity.com/advisories/vulnerability/schneider-electric-accutech-manager-27-and-prior-classic-buffer-overflow</loc>
            <lastmod>2023-07-19</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/advisories/vulnerability/fortiwan-os-command-injection-leads-to-privilege-escalation</loc>
            <lastmod>2022-03-09</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/advisories/vulnerability/asus-aicloud-buffer-overflow-vulnerability-resecurity-inc</loc>
            <lastmod>2022-03-09</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/advisories/vulnerability/microsoft-splwow64-elevation-of-privilege-vulnerability</loc>
            <lastmod>2022-03-09</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/advisories/vulnerability/oracle-vm-virtualbox-local-privilege-escalation</loc>
            <lastmod>2022-03-09</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/advisories/vulnerability/microsoft-internet-explorer-remote-code-execution-rce</loc>
            <lastmod>2022-03-09</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/advisories/vulnerability/macos-high-sierra-10132-arbitrary-code-execution-with-kernel-privileges</loc>
            <lastmod>2022-03-09</lastmod>
        </url>
    
            <url>
            <loc>https://www.resecurity.com/resources</loc>
        </url>
                <url>
            <loc>https://www.resecurity.com/resources/article/context-data-sheet</loc>
            <lastmod>2023-09-05</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/resources/article/risk-data-sheet</loc>
            <lastmod>2023-09-05</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/resources/article/resecurity-overview-data-sheet</loc>
            <lastmod>2023-09-05</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/resources/article/hunter-data-sheet</loc>
            <lastmod>2023-09-06</lastmod>
        </url>
            <url>
            <loc>https://www.resecurity.com/resources/article/epp-data-sheet</loc>
            <lastmod>2023-09-06</lastmod>
        </url>
    
</urlset>